<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CiscoASAv subinterfaces traffic is not passing in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835596#M1100416</link>
    <description>&lt;P&gt;can you ping from host to interface of ASA??&lt;/P&gt;</description>
    <pubDate>Mon, 15 May 2023 14:30:14 GMT</pubDate>
    <dc:creator>MHM Cisco World</dc:creator>
    <dc:date>2023-05-15T14:30:14Z</dc:date>
    <item>
      <title>CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835592#M1100414</link>
      <description>&lt;P&gt;Hi Everyone,&lt;/P&gt;&lt;P&gt;I am struggling with the ASA configuration with 2 Subinterfaces and am not able to ping from one vlan host to another vlan host, I haven't applied any ACLs and NAT as am not testing it with the internet.&lt;/P&gt;&lt;P&gt;int gi0/0.10&lt;/P&gt;&lt;P&gt;vlan 10&lt;/P&gt;&lt;P&gt;nameif VLAN10&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip add 10.255.255.5 255.255.255.0&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;int gi0/0.20&lt;/P&gt;&lt;P&gt;vlan 20&lt;/P&gt;&lt;P&gt;nameif VLAN20&lt;/P&gt;&lt;P&gt;security-level 50&lt;/P&gt;&lt;P&gt;ip add 20.255.255.5 255.255.255.0&lt;BR /&gt;&lt;BR /&gt;I have 2 PCs connected one each on one port and am not able to ping from one host machine to another&lt;/P&gt;&lt;P&gt;same-security-traffic permit inter/intra-interface is already there&lt;/P&gt;&lt;P&gt;inspect icmp is also there in default policy-map&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Can anyone assist me with the problem cause?&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 14:24:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835592#M1100414</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-15T14:24:44Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835596#M1100416</link>
      <description>&lt;P&gt;can you ping from host to interface of ASA??&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 14:30:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835596#M1100416</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-15T14:30:14Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835597#M1100417</link>
      <description>&lt;P&gt;yes to the interface is pingable&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 14:30:45 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835597#M1100417</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-15T14:30:45Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835629#M1100420</link>
      <description>&lt;P&gt;show interface ip brief &amp;lt;&amp;lt;- share this&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 14:57:03 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835629#M1100420</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-15T14:57:03Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835654#M1100421</link>
      <description>&lt;P&gt;ciscoasa(config)# show int ip br&lt;BR /&gt;Interface IP-Address OK? Method Status Protocol&lt;BR /&gt;GigabitEthernet0/0 172.16.10.1 YES CONFIG up up&lt;BR /&gt;GigabitEthernet0/1 192.168.10.1 YES CONFIG up up&lt;BR /&gt;GigabitEthernet0/2 192.168.0.1 YES CONFIG up up&lt;BR /&gt;GigabitEthernet0/3 unassigned YES unset up up&lt;BR /&gt;GigabitEthernet0/3.10 10.255.255.5 YES manual up up&lt;BR /&gt;GigabitEthernet0/3.20 20.255.255.5 YES manual up up&lt;BR /&gt;GigabitEthernet0/4 unassigned YES unset administratively down up&lt;BR /&gt;GigabitEthernet0/5 unassigned YES unset administratively down up&lt;BR /&gt;GigabitEthernet0/6 unassigned YES unset administratively down up&lt;BR /&gt;Management0/0 unassigned YES unset administratively down up&lt;/P&gt;&lt;P&gt;here it is&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 15:15:34 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835654#M1100421</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-15T15:15:34Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835658#M1100422</link>
      <description>&lt;P&gt;it OK all sub interface is UP&amp;nbsp;&lt;BR /&gt;please share the packet-tracer for ping between the two host&amp;nbsp;&lt;BR /&gt;NOTE:- add keyword detail in end of packet-tracer&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 15:19:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835658#M1100422</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-15T15:19:43Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835666#M1100423</link>
      <description>&lt;P&gt;ciscoasa(config)# packet-tracer input VLAN10 icmp 10.255.255.2 8 0 20.255.255.2 detailed&lt;/P&gt;&lt;P&gt;Phase: 1&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;%ASA-7-609001: Built local-host VLAN10:10.255.255.2&lt;BR /&gt;%ASA-7-609001: Built local-host VLAN20:20.255.255.2&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;%ASA-6-302020: Built inbound ICMP connection for faddr 10.255.255.2/0 gaddr 20.255.255.2/0 laddr 20.255.255.2/0 type 8 code 0&lt;BR /&gt;found next-hop 20.255.255.2 using egress ifc VLAN20&lt;/P&gt;&lt;P&gt;Phase: 2&lt;BR /&gt;Type: ACCESS-LIST&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Implicit Rule&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671bba070, priority=2, domain=permit, deny=false&lt;BR /&gt;hits=4, user_data=0x0, cs_id=0x0, flags=0x3000, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=VLAN10, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 3&lt;BR /&gt;&amp;lt;--- More ---&amp;gt;%ASA-6-302021: Teardown ICMP connection for faddr 10.255.255.2/0 gaddr 20.255.255.2/0 laddr 20.255.255.2/0 type 8 code 0&lt;BR /&gt;%ASA-7-609002: Teardown local-host VLAN10:10.255.255.2 duration 0:00:00&lt;BR /&gt;%ASA-7-609002: Teardown local-host VLAN20:20.255.255.2 duration 0:00:00&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f167129f660, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=101, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 4&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671bbd3c0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=42, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=VLAN10, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 5&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671ac8c80, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=47, user_data=0x7f1671a34f20, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 6&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;class-map inspection_default&lt;BR /&gt;match default-inspection-traffic&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;inspect icmp&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671bcf770, priority=70, domain=inspect-icmp, deny=false&lt;BR /&gt;hits=5, user_data=0x7f1671b39240, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=VLAN10, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 7&lt;BR /&gt;Type: INSPECT&lt;BR /&gt;Subtype: np-inspect&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Forward Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671bbcbd0, priority=66, domain=inspect-icmp-error, deny=false&lt;BR /&gt;hits=32, user_data=0x7f1671bbc890, cs_id=0x0, use_real_addr, flags=0x0, protocol=1&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, icmp-type=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, icmp-code=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=VLAN10, output_ifc=any&lt;BR /&gt;&lt;BR /&gt;Phase: 8&lt;BR /&gt;Type: QOS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671ac8c80, priority=70, domain=qos-per-class, deny=false&lt;BR /&gt;hits=48, user_data=0x7f1671a34f20, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 9&lt;BR /&gt;Type: NAT&lt;BR /&gt;Subtype: per-session&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f167129f660, priority=0, domain=nat-per-session, deny=true&lt;BR /&gt;hits=103, user_data=0x0, cs_id=0x0, reverse, use_real_addr, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=any, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 10&lt;BR /&gt;Type: IP-OPTIONS&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;Reverse Flow based lookup yields rule:&lt;BR /&gt;in id=0x7f1671c2c8e0, priority=0, domain=inspect-ip-options, deny=true&lt;BR /&gt;hits=17, user_data=0x0, cs_id=0x0, reverse, flags=0x0, protocol=0&lt;BR /&gt;src ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any&lt;BR /&gt;dst ip/id=0.0.0.0, mask=0.0.0.0, port=0, tag=any, dscp=0x0&lt;BR /&gt;input_ifc=VLAN20, output_ifc=any&lt;/P&gt;&lt;P&gt;Phase: 11&lt;BR /&gt;Type: FLOW-CREATION&lt;BR /&gt;Subtype:&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;New flow created with id 76, packet dispatched to next module&lt;BR /&gt;Module information for forward flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Module information for reverse flow ...&lt;BR /&gt;snp_fp_inspect_ip_options&lt;BR /&gt;snp_fp_inspect_icmp&lt;BR /&gt;snp_fp_adjacency&lt;BR /&gt;snp_fp_fragment&lt;BR /&gt;snp_fp_tracer_drop&lt;BR /&gt;snp_ifc_stat&lt;/P&gt;&lt;P&gt;Phase: 12&lt;BR /&gt;Type: ROUTE-LOOKUP&lt;BR /&gt;Subtype: Resolve Egress Interface&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;found next-hop 20.255.255.2 using egress ifc VLAN20&lt;/P&gt;&lt;P&gt;Phase: 13&lt;BR /&gt;Type: ADJACENCY-LOOKUP&lt;BR /&gt;Subtype: next-hop and adjacency&lt;BR /&gt;Result: ALLOW&lt;BR /&gt;Config:&lt;BR /&gt;Additional Information:&lt;BR /&gt;adjacency Active&lt;BR /&gt;next-hop mac address 5000.0005.0000 hits 4 reference 1&lt;/P&gt;&lt;P&gt;Result:&lt;BR /&gt;input-interface: VLAN10&lt;BR /&gt;input-status: up&lt;BR /&gt;input-line-status: up&lt;BR /&gt;output-interface: VLAN20&lt;BR /&gt;output-status: up&lt;BR /&gt;output-line-status: up&lt;BR /&gt;Action: allow&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 15:23:28 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835666#M1100423</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-15T15:23:28Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835675#M1100424</link>
      <description>&lt;P&gt;every think is fine,&amp;nbsp;&lt;BR /&gt;check&amp;nbsp;&lt;BR /&gt;show arp&amp;nbsp;&lt;BR /&gt;check the mac address for both host&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 15:29:26 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835675#M1100424</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-15T15:29:26Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835678#M1100425</link>
      <description>&lt;P&gt;Thank you for your prompt reply to me!&lt;/P&gt;&lt;P&gt;Here is the output Yes MAC is showing correctly as the system MACs which is in both Case a VM-WIN-10&lt;/P&gt;&lt;P&gt;ciscoasa(config)# show arp&lt;BR /&gt;outside 172.16.10.10 aabb.cc00.3000 8975&lt;BR /&gt;inside 192.168.10.10 aabb.cc00.2000 8540&lt;BR /&gt;mgmt 192.168.0.2 0050.56c0.0001 4700&lt;BR /&gt;VLAN10 10.255.255.2 5000.0007.0000 2208&lt;BR /&gt;VLAN10 10.255.255.1 aabb.cc80.4000 2267&lt;BR /&gt;VLAN20 20.255.255.2 5000.0005.0000 2214&lt;BR /&gt;VLAN20 20.255.255.1 aabb.cc80.4000 2274&lt;/P&gt;&lt;P&gt;I am struggling since hours but unable to find the cause configuration looks to me fine as well.&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 15:35:12 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835678#M1100425</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-15T15:35:12Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835687#M1100426</link>
      <description>&lt;P&gt;Your config is correct'&amp;nbsp;&lt;/P&gt;
&lt;P&gt;The Host FW is drop icmp&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Allow icmp in host FW and check again&lt;BR /&gt;&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp;&lt;A href="https://activedirectorypro.com/allow-ping-windows-firewall/" target="_blank"&gt;https://activedirectorypro.com/allow-ping-windows-firewall/&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 15 May 2023 18:50:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4835687#M1100426</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-15T18:50:23Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844207#M1100961</link>
      <description>&lt;P&gt;Sure I will open that lab again to keep this check and will get back&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 14:05:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844207#M1100961</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-28T14:05:52Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844335#M1100970</link>
      <description>&lt;P&gt;VM-WIN-10 running windows 10 by default WIN-10 (software) firewall is ON, you need to turn OFF for private network it will fix the issue and you will able to ping between subnet. And also you will able to ping from the ASA box to your WIN-10 host.&lt;BR /&gt;&lt;BR /&gt;as it stand either you cant ping between two different subnet and even you cant ping from ASA to WIN-10 (example&amp;nbsp; -FW interface 20.255.255.5 and WIN-10 host 20.255.255.X the ping will fail due to the fact Windows software is on).&lt;/P&gt;
&lt;P&gt;This is very common mistake and mostly ignored many time and lead us to pull our hair out where the issue is &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 21:18:32 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844335#M1100970</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-28T21:18:32Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844336#M1100971</link>
      <description>&lt;P&gt;&lt;a href="https://community.cisco.com/t5/user/viewprofilepage/user-id/1065752"&gt;@MHM Cisco World&lt;/a&gt; Its more likely the Windows software Firewall is ON. if the OP turn off the windows software firewall for Priavte network it will fix the issue.&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 21:20:31 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844336#M1100971</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-28T21:20:31Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844338#M1100972</link>
      <description>&lt;P&gt;Thanks' I already suggested to him check win os firewall.&lt;/P&gt;
&lt;P&gt;Waiting his reply.&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Sun, 28 May 2023 21:22:29 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4844338#M1100972</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-28T21:22:29Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4845527#M1101039</link>
      <description>&lt;P&gt;Thank you for sharing the possible options but I already had that firewall disabled in the Windows-10 (Software) it was still the same I will check that again building tha lab one more time to check if the same issue is coming.&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 15:44:44 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4845527#M1101039</guid>
      <dc:creator>Juni</dc:creator>
      <dc:date>2023-05-30T15:44:44Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4845918#M1101045</link>
      <description>&lt;P&gt;I completely missed you are using ASAv its only defined in your Subject line. I was under-the-Impression you using a physical box. As it is ASAv.&lt;/P&gt;
&lt;LI-CODE lang="markup"&gt;GigabitEthernet0/3 unassigned YES unset up up
GigabitEthernet0/3.10 10.255.255.5 YES manual up up
GigabitEthernet0/3.20 20.255.255.5 YES manual up up&lt;/LI-CODE&gt;
&lt;P&gt;your configured GiagbitEthernet 0/3 with sub-Interfaces. I think the issue is with your vswitch presentation. check vmware-vswitch setting (what vlan/s are configured).&lt;/P&gt;</description>
      <pubDate>Tue, 30 May 2023 20:44:23 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4845918#M1101045</guid>
      <dc:creator>Sheraz.Salim</dc:creator>
      <dc:date>2023-05-30T20:44:23Z</dc:date>
    </item>
    <item>
      <title>Re: CiscoASAv subinterfaces traffic is not passing</title>
      <link>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4846019#M1101050</link>
      <description>&lt;P&gt;&lt;SPAN&gt;mac-address auto &amp;lt;&amp;lt;- Add this command to global and reload the ASAv and check again&amp;nbsp;&amp;nbsp;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P class="p"&gt;If you disable MAC address generation, see the following default MAC addresses:&lt;/P&gt;
&lt;UL class="ul"&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;For the ASA 5500-X series appliances—The physical interface uses the burned-in MAC address, and a&lt;STRONG&gt;ll subinterfaces of a physical interface use the &lt;U&gt;same&lt;/U&gt; burned-in MAC address&lt;/STRONG&gt;.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI class="li"&gt;
&lt;P class="p"&gt;For the ASASM—All VLAN interfaces use the same MAC address, derived from the backplane MAC address.&lt;/P&gt;
&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 31 May 2023 00:58:51 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/ciscoasav-subinterfaces-traffic-is-not-passing/m-p/4846019#M1101050</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2023-05-31T00:58:51Z</dc:date>
    </item>
  </channel>
</rss>

